arrow_back
一加手机官方ROM下载
chevron_right tool chevron_right oppo_decrypt
more_vert
face 远程刷机救砖
重要公告
1. ROOT无需下载全量包,只需【官方链接】即可。【教程在这里】
2. 请通过百度网盘下载文件。机型页面有说明;
3. 请勿反馈【官方链接】的任何问题,【官方链接】能否访问与本站无关。

(本公告1小时内不重复弹出)
登录
lock
解包ofp和ops格式的工具,可以解包出img镜像
https://github.com/bkerler/oppo_decrypt

# oppo_decrypt
Oppo .ofp and Oneplus .ops Firmware decrypter
------------------------------------

* ofp_qc_decrypt.py  : Decrypts oppo qc chipset based firmware with .ofp extension (oppo)
* ofp_mtk_decrypt.py : Decrypts oppo mtk chipset based firmware with .ofp extension (oppo)
* opscrypto.py       : Decrypts and re-encrypts based firmware with .ops extension (oneplus)
* backdoor.py        : Enables hidden "readback" functionality


Installation:
-------------
- Install >= python 3.8 and pip3

In the console, run
```bash
pip3 install -r requirements.txt
```

Both Linux and Windows now supported, folks !

Usage:
-------- 
* Extract oppo ofp file:

```
python3 ofp_qc_decrypt.py [myops.ofp] [directory to extract]
python3 ofp_mtk_decrypt.py [myops.ofp] [directory to extract]
```

* Extract oneplus ops file:

```
python3 opscrypto.py decrypt [myops.ops]
```
File will be in the extract subdirectory

* Repack oneplus ops file:

```
python3 opscrypto.py encrypt [path to extracted firmware]
```


* Enable readback mode (use admin command prompt under windoze):

```
python3 backdoor.py "MsmDownloadTool V4.0.exe"'
```

* Merge super images:

The .ofp may contain super firmware from multiple carriers, check the super_map.csv.txt outside .ofp first.

```
sudo apt install simg2img # If you have already installed, skip this step.
simg2img [super.0.xxxxxxxx.img] [super.1.xxxxxxxx.img] [super.1.xxxxxxxx.img] [filename to merge] # All split super imgs must be the same carrier
```

License:
-------- 
Share, modify and use as you like, but refer the original author !
And if you like my work, please donate :)